mod_rangelimit aims to provide protection from DoS attacks using the Range header in Apache. It does so by analyzing the ranges supplied in the Range header. It checks the headers before mod_setenvif, and if there is even one invalid range in the request, the whole request is declined. The module also checks the number of supplied ranges and the number of overlapping ranges. It provides two options, MaxRanges (defaulting to 20) and MaxOverlappingRanges (defaulting to 5).